Zobrazeno 1 - 10
of 143
pro vyhledávání: '"Ghita, Bogdan"'
Autor:
Kuzminykh, Ievgeniia, Nawaz, Tareita, Shenzhang, Shihao, Ghita, Bogdan, Raphael, Jeffery, Xiao, Hannan
AI tools, particularly large language modules, have recently proven their effectiveness within learning management systems and online education programmes. As feedback continues to play a crucial role in learning and assessment in schools, educators
Externí odkaz:
http://arxiv.org/abs/2410.11904
Identity Access Management (IAM) is an area posing significant challenges, particularly in the context of remote connectivity and distributed or cloud-based systems. A wide range of technical solutions have been proposed by prior research, but the in
Externí odkaz:
http://arxiv.org/abs/2408.10634
The modern digital world is highly heterogeneous, encompassing a wide variety of communications, devices, and services. This interconnectedness generates, synchronises, stores, and presents digital information in multidimensional, complex formats, of
Externí odkaz:
http://arxiv.org/abs/2402.13746
Modern streaming services are increasingly labeling videos based on their visual or audio content. This typically augments the use of technologies such as AI and ML by allowing to use natural speech for searching by keywords and video descriptions. P
Externí odkaz:
http://arxiv.org/abs/2109.09906
Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ
Externí odkaz:
http://arxiv.org/abs/2109.09905
Attack vectors are continuously evolving in order to evade Intrusion Detection systems. Internet of Things (IoT) environments, while beneficial for the IT ecosystem, suffer from inherent hardware limitations, which restrict their ability to implement
Externí odkaz:
http://arxiv.org/abs/2109.09530
Publikováno v:
NEW2AN 2019, ruSMART 2019: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 65-76
Internet of Things devices have seen a rapid growth and popularity in recent years with many more ordinary devices gaining network capability and becoming part of the ever growing IoT network. With this exponential growth and the limitation of resour
Externí odkaz:
http://arxiv.org/abs/2109.03375
Publikováno v:
2020 6th IEEE International Conference on Network Softwarization (NetSoft)
Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several soluti
Externí odkaz:
http://arxiv.org/abs/2109.02417